How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data